program with an overt purpose (known to user) and a covert purpose (unknown to user), makes copies of itself
trojan horse
virus that conceals infection of files, able to infect a system without using system subroutines, can intercept operating system calls to access files
stealth viruses
a virus composed of a sequence of instructions that are interpreted by application rather than executed directly
macro virus
something that could potentially harm an organization's assets, "somebody could hack into your system and steal personal data"
threat
a formalization of an attacker in a computer or networked system
cyber adversary model
a program that performs an action that violates the site security policy when some external event occurs
logic bombs
a virus that does not change size of file
cavity virus
worms
actual realization of threat
attack
a threat wherein the organization structure is very low, attacks are typically mounted by a single person or a small, loosely affiliated group, attacks unaware of who/what they are attacking
unstructured threat
program that inserts itself into one or more files and performs some action, may be based on conditions
a virus that changes its form each time it inserts itself into another program
polymorphic viruses
a program that absorbs all of some class of resources
rabbits/bacteria
a weakness or opening that would allow a threat to be realized
vulnerability
organized group of attackers, attackers aware of who they are attacking, targets specifically chosen
structured threat
a virus that can infect boot sectors and/or executables
multipartite viruses
a virus that is enciphered except for a small deciphering routine
encrypted virus
malicious code which is annoying, undesired, and negatively affects performance
grayware
the probability (percentage chance) that it will happen
risk
highly structured threat
"Terminate and Stay Resident", a virus that stays active in memory after the application (or bootstrapping) is completed
TSR Viruses
completely rewrites itself after each infection
metamorphic viruses
software with little or no benefit sold to naive user with unethical marketing
scareware
action taken to minimize or eliminate the effects of the threat
mitigation
evidence-based knowledge, helps understand the adversary's decision-making process, monitors for advanced indication and warning of potential attacks
cyber threat intelligence